Social engineering is not a new concept, but it is an enduring one that is steadily growing, with no end in sight.
One of the most common social engineering schemes is phishing, which is defined as "the use of social engineering and technical subterfuge to defraud an online account holder of their financial...
From ransomware to business email compromise, most of today's Internet scourges - in spite of vast differences in their appearances - are related to each other and depend on a small number of reused adversarial techniques. Decomposing the threats into these atomic building blocks is helpful to understand the nature of...
One of the most frustrating threat innovations of the last decade has been ransomware malware. Initially considered just a consumer threat, both government and commercial enterprise networks can now be listed among its victims.
In this Infographic, Forcepoint Security Labs examines the technical and business...
Every day, your employees - usually accidentally - create vulnerabilities that create opportunities for data breaches. You must balance risks with giving employees the access they need to succeed. While cloud apps and BYOD policies are known to increase user productivity & lower operating costs, they are also...
Organizations are scrambling to identify security weaknesses before their adversaries do. Having a consistent, systematic, and scalable methodology to properly assess your environment is essential. To begin you need a solid understanding of the organization, its components, what it relies on, and what could cause it...
Businesses around the world are seeing an increase in malware attacks, including ransomware like CryptoLocker, Locky, and zCrypt. These attacks can result in weeks of downtime, and some of the most damaging data breaches originated with malware, including the Target breach in 2014.
A robust malware defense could...
The first quarter of 2017 brought with it some significant changes to the threat landscape, and we aren't talking about heavy ransomware distribution either. New threats and infection techniques have forced the security community to reconsider collection and analysis efforts.
This report takes a deep look at which...
In 2016, there were two contenders for king of ransomware: Locky and Cerber. So far in 2017, we've seen a massive shift in the battle between these two families, with Locky basically dropping out entirely and Cerber expanding its market share by a significant amount. New families such as Spora are emerging as well,...
When she first joined the Los Angeles County district attorney's office, Maria Ramirez prosecuted street gangs. Now she's cracking down on cyber gangs and is opening her case file to share lessons learned from cases involving business email compromise and ransomware.
Ransomware and malvertising are catching security organizations flat-footed. Even groups with mature security operations are having trouble responding to the latest iteration of security threats. According to a recent report, barely one-third of global organizations feel prepared to handle these modern cyberattacks....
Ransomware grabbed headlines in 2016, becoming the favorite attack used against businesses. However, ad fraud malware and botnets infecting Internet of Things (IoT) devices to launch massive DDoS attacks also became serious threats. So what should you expect from malware in 2017?
Download the 2017 State of Malware...
Phishing and ransomware are serious threats that can cause enormous damage to an organization's finances, data assets and reputation. This white paper can help you reduce the chance of a successful phishing or ransomware attack and minimize the consequences if an attack breaches your defenses.
Download this...
Impostor email threats, also known as business email compromise (BEC) and CEO fraud, have hit more than 7,000 companies since the FBI's Internet Crime Complaint Center (IC3) began tracking this type of scam in late 2013. Those that succeed can yield millions of dollars in fraudulent transfers.
Download this eBook...
A scareware campaign has been locking iOS devices with faux ransomware, demanding a payoff via virtual iTunes gift cards, security researchers warn. A fix for the exploited iOS flaw is included in a massive batch of product patches and updates released by Apple.
While attackers continue to innovate, traditional intrusion prevention systems (IPS) have stood still, generating low-value alerts for security teams as attackers slip past in pursuit of high-value targets. Organizations have countered by piling more and more equipment on the network hoping to solve the problem....
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing ransomware.databreachtoday.com, you agree to our use of cookies.